Audit Trail Reports

Step by Step: Best practices for security patch management
sponsored by TechTarget Security
EGUIDE: Whether you're new to patch management or just need a refresher, this expert e-guide reviews best practices for security patch management to ensure accurate, effective patch testing in your organization.
Posted: 03 Mar 2011 | Published: 03 Mar 2011

TechTarget Security

Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
sponsored by Imperva
WHITE PAPER: Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

Virtualization Security: Protecting Virtualized Environments
sponsored by TechTarget ComputerWeekly.com
BOOK: This extract from the book Virtualization Security, includes a 30% discount for Computer Weekly readers.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

TechTarget ComputerWeekly.com

Speed Up Your Business with E-Signatures
sponsored by Adobe EchoSign
WHITE PAPER: This white paper shows how IT departments can implement an e-signature solution that will cut down physical paperwork and increase efficiency.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Adobe EchoSign

Unifying Management of Physical and Electronic Records: The Records Management Imperative
sponsored by EMC Corporation
WHITE PAPER: This white paper explains the features and benefits of such a unified approach to enterprise records management, and describes how the EMC Documentum/OmniRIM solution works.
Posted: 13 Mar 2008 | Published: 01 Feb 2007

EMC Corporation

Strategies to Survive Software Asset Management Audits
sponsored by CDW Corporation
WEBCAST: This exclusive webcast can help you prepare for an audit by covering some software asset management (SAM) strategies and tactics you should adopt to get ready for a software audit.
Posted: 28 Feb 2014 | Premiered: Feb 27, 2014

CDW Corporation

Strategies to Maintain PCI DSS Compliance
sponsored by GeoTrust, Inc.
EGUIDE: This e-guide outlines strategies for streamlining key PCI DSS processes to ensure that comprehensive compliance is achieved efficiently – for maximum business benefit.
Posted: 23 Jul 2013 | Published: 23 Jul 2013

GeoTrust, Inc.

Best Practices for Mobile Data Protection
sponsored by TechTarget Security
EGUIDE: This expert e-guide presents five essential best practices for securing employee-liable mobile devices and tablets that will allow you to safely embrace the trend toward using personal devices for business.
Posted: 01 Jun 2011 | Published: 01 Jun 2011

TechTarget Security

Five Critical Rules for Firewall Management: Lessons from the Field
sponsored by Dell SecureWorks
WHITE PAPER: This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.
Posted: 11 May 2016 | Published: 08 Jun 2011

Dell SecureWorks

Simplify implementation of the HITRUST Common Security Framework
sponsored by Symantec Corporation
WHITE PAPER: Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.
Posted: 24 Apr 2014 | Published: 31 Mar 2013

Symantec Corporation